Mobile computers often benefit from software which adapts to their location. For example, a computer might be backed up when at the office, or the default printer might always be ...
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
Ubiquitous environments facilitate the fast and easy access to users’ physical environments. Ubiquitous environments typically capture users’ presence and activities in a room...
Tom Gross, Thilo Paul-Stueve, Tsvetomira Palakarsk...
For the majority of front-end e-business systems, the assumption of a coherent and homogeneous set of interfaces is highly unrealistic. Problems start in the back-end, with system...
Giacomo Piccinelli, Wolfgang Emmerich, Christian Z...
We consider an overlay architecture (called OMNI) where service providers deploy a set of service nodes (called MSNs) in the network to efficiently implement media-streaming appli...
Suman Banerjee, Christopher Kommareddy, Koushik Ka...